Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s…
Incremental Backup
Regular backup of data is essential, especially for businesses. Without a consistent backup solution, you have no way to recover data in the event of a disaster. Doing a full backup of all files gives you a good foundation for restoration, but…
System Image Backup
Any business that has suffered a data loss and survived knows the importance of a good backup strategy. Many businesses assume it will never happen and have no backup services or inadequate backup plans. Simply backing up information to discs or…
Backup Solutions
Backup Solutions- How to pick the best one for your business Regardless of size, every business needs good backup solutions. Every year, thousands of businesses across the United States lose months or even years of their data because of system crashes…
Why You Need Network Documentation
You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly…
Best Security Practices for Remote Access Users
In the time of Covid-19, many businesses have been forced to ask their employees to work from home. As a result, the work from home (WFH) model may become a permanent alternative for many workers who can effectively complete their required tasks…
Mobile Device Management with Office 365
Mobile Device Management is important when it comes to your overall technology security strategy. If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each…
Ransomware and Small Business
Held for Ransom Are you aware of the danger of ransomware? As defined on our blog, ransomware is malware (MALicious softWARE) that locks all of the data on your network with encryption. The perpetrators then demand a ransom to unlock your data….
Passwords aren’t enough-setup MFA and SSO now!!
You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a…
What is your backup policy? Do you even have one?
If you are practicing proper computer security measures, then you are running routine backups. Do you have a policy for your backups? Is it written down? If so, then add it to your official policy manual so anyone can easily understand and…